Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
be4344b18746e7b6a24c40e70237c5d0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be4344b18746e7b6a24c40e70237c5d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
be4344b18746e7b6a24c40e70237c5d0N.exe
-
Size
1.1MB
-
MD5
be4344b18746e7b6a24c40e70237c5d0
-
SHA1
f08375a4b35e5e42a54850a5bb11a73801893ff3
-
SHA256
b9d8b129056e0b767e2959b80c0f071c85a2797e93ca9d94b60e6b6447584bb8
-
SHA512
7ba7f9345d50460769d1dca5ef3fafb92e47791e72acef2c83dfeb8bf2192f71a7b4dad6a56db71d9792ae73ef83768b2e7778c49906c8553a2b2b4c10c5c42d
-
SSDEEP
24576:Uamb/RCqTlVYCMXcawD4RLZmN1VUZmSordfqsH:UambpCsYDXcqZmXiZmSadfqw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 FD04.tmp -
Executes dropped EXE 1 IoCs
pid Process 2124 FD04.tmp -
Loads dropped DLL 1 IoCs
pid Process 2604 be4344b18746e7b6a24c40e70237c5d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be4344b18746e7b6a24c40e70237c5d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD04.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2124 2604 be4344b18746e7b6a24c40e70237c5d0N.exe 29 PID 2604 wrote to memory of 2124 2604 be4344b18746e7b6a24c40e70237c5d0N.exe 29 PID 2604 wrote to memory of 2124 2604 be4344b18746e7b6a24c40e70237c5d0N.exe 29 PID 2604 wrote to memory of 2124 2604 be4344b18746e7b6a24c40e70237c5d0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\be4344b18746e7b6a24c40e70237c5d0N.exe"C:\Users\Admin\AppData\Local\Temp\be4344b18746e7b6a24c40e70237c5d0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\FD04.tmp"C:\Users\Admin\AppData\Local\Temp\FD04.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a23e285d577a8ae62f95647f8fffea77
SHA1594e119697ed80080c32710a5ac1c3cc7370bc21
SHA2563b5e5a3ef8f7c8c7d11f4db6b1a09c92acb0b4ca6b9d5b16553bb3083f84277e
SHA5125a6fa7ccdd9f4105c9bec92a5472d744e90fb2e6bab22fb8cd74db870dde1dd02d4398634492e3dd1d7aa28bb0a7b7942c193eb3eda543a1764f3aae62eb02e4